Customer Portal
Support
Documentation
GitHub
FAQ
Contact
English
Polski
Try for free
Solutions
Use cases
Network automation
Automatic asset management
Network performance monitoring
Unknown threat detection
Compliance and regulation
See all use cases
Industries
Sycope for the Enterprise Sector
Sycope for the Public Sector
Sycope for Telco & ISP
Sycope for Education
Products
Network Observability Platform
Visibility
Performance
Security
Asset discovery
Open source
LinkSense
TrueID
Pricing
Resources
Blog
Articles on cyber security, network monitoring and IT industry trends.
Videos library
Tutorials, how-to videos and webinars.
Dictionary
Topics and terms around network visibility, performance and security well and easy explained.
Case Studies
Sycope’s clients success stories.
Integrations
List of solutions and products compatible with Sycope.
White paper & ebook
Expertiese knowledge shared by Sycop’s experts – download for free.
Resource library
All Sycope’s content in one place. Filter and search our library.
Partners
Become a Partner
Grow your business with Sycope.
Deal registration
Authorize your deal and get special benefits.
Company
About Us
Meet the people who build and developed Sycope.
Events
Upcoming events and live webinars – let’s meet.
Career
Opportunities to join Sycope’s team.
Request a demo
Try for free
Request a demo
Try for free
Home
-
Dictionary
Sycope dictionary
We understand how important it is to build the knowledge around the solution we offer - we provide you with extra insights that can help in using the Sycope solution more effectively.
Learn more
Newest additions
VPN
A virtual private network that encrypts internet traffic and masks your IP address to improve privacy and security online.
Learn more >
BGP (Border Gateway Protocol)
A routing protocol that directs data between different networks on the internet. It helps choose paths for traffic so networks can exchange information efficiently.
Learn more >
sFlow
A network traffic monitoring method that samples packets on devices and sends the data to a collector for analysis. It is used to detect anomalies, threats, and usage patterns in real time.
Learn more >
XSS (Cross-Site Scripting)
A web vulnerability where attackers inject malicious code into pages viewed by others. It can steal data, hijack sessions, or alter site behavior.
Learn more >
Check our vocabulary
Filter:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Clear all filters
Internet Peering
A direct network interconnection between ISPs, enabling mutual traffic exchange, enhancing efficiency, and reducing costs.
Learn more >
Intrusion Detecting System
A security solution that monitors network traffic for signs of suspicious activity, cyberattacks, or policy violations.
Learn more >
IoA (Indicator of Attack)
An indicator of attack is a sign of suspicious activity that may show an attack is in progress or about to happen. It helps security teams detect and stop threats early.
Learn more >
IoC (Indicator of Compromise)
An indicator of compromise is a digital artifact or behavior that may signal a security breach. It helps security teams detect, investigate, and respond to threats quickly.
Learn more >
IPFIX
A standardized method for exporting network flow data, enabling detailed analysis of traffic patterns.
Learn more >
IPS (Intrusion Prevention System)
An intrusion prevention system monitors network traffic for suspicious activity and blocks detected attacks automatically. It helps protect systems and data from unauthorized access and other threats.
Learn more >
Lateral Movement
Lateral movement is a post-breach technique where attackers move across a network to escalate privileges and access sensitive systems and data.
Learn more >
Malware
Malicious software designed to infiltrate systems, steal data, disrupt operations, or sabotage computers without user knowledge or consent.
Learn more >
Man-in-the-Middle (MitM)
Attack where a hacker intercepts and eavesdrops on communications between two parties, potentially stealing data or altering information.
Learn more >
MITTRE ATT&CK
A knowledge base that classifies and documents cyber threat tactics and techniques enabling effective defence against cyber attacks.
Learn more >
MTTD (Mean Time to Detect)
The average time it takes to detect a security threat or incident. It measures how quickly an organization identifies problems so it can respond sooner and reduce damage.
Learn more >
MTTR (Mean Time to Repair)
The average time needed to repair a system or recover from an incident after a failure is detected. It measures how quickly operations can be restored and downtime reduced.
Learn more >
1
2
3
4
5
6
7
x
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
< Previous video
Next video >
Leveraging the nTop nDPI for Application Visibility within Sycope/nProbe integration
This site is registered on
wpml.org
as a development site. Switch to a production site key to
remove this banner
.